MobileWare, Inc. | Enterprise Mobility Management Partner

  866.850.7682 | info@mobilewareus.com | Login

Tag - cybersecurity

6
Nov

Multi-threading Security Threat: PortSmash

There has been an ever-increasing need for CPUs, both commercial and consumer, to perform faster. In order to do so, certain aspects have been built into processors. While increasing performance, multithreading and speculative execution have left CPUs and networks around the world at risk. Unlike the speculative execution risk of Spectre and Meltdown, a multi-threading …

16
Oct

Security Protocols: No One is Immune

This past week has been a rough week for cybersecurity in the Pentagon. Not only did the Pentagon fail in their weapons program security protocols, but the Pentagon has announced a data breach affecting over 30,000 DOD employee records. So, where did the Pentagon fail in security protocols? And what lead to the data breach? …

28
Aug

Security Monitoring: Walls Aren’t Enough

Once again, we are reminded the importance of cybersecurity on multiple levels. The news that big tech companies have intercepted not only Russian, but Iranian influence campaigns, should make all executives question the security monitoring of their own companies. Regardless if the company is large or small, IoT and mobility has continued to flood servers …

10
Jul

Security: We Bet You Are Making One of These Mistakes

Cybersecurity is important for any business to focus on, as cybercrime continues to escalate. The average data breach costs $7.35 million dollar, a 5% increase in 2017 over the previous year. That is an average of $225 per lost or stolen record. Think about how many records your business stores and how costly a lack …

20
Jun

Cybersecurity: What You Don’t Know About Your Risks

Cybersecurity is a big-ticket item for any business. As more data breaches occur, businesses need to focus on security needs. Cybercrime is escalating, with the US experiencing an average of 22% increase in data breaches in 2017. However, most businesses do not have the appropriate budget assigned for security risks. Nor is money allocated into …

29
May

Scareware: A Silent Form of Hacking

It can happen to anyone, any time. A user are browsing on the internet, for work or for pleasure, when suddenly a box pops up. A virus has infected your computer and call the support number immediately. Scareware has just attacked you. The box can include anything from the browser logo to the logo of …

16
Jan

Meltdown and Spectre: Is Your Security at Risk?

Last week Las Vegas hosted the International Consumer Electronics Show. Although a technology conference focused on the biggest and brightest tech for consumers, security took center stage this year. Namely, manufacturers attempted to answer some questions about the Meltdown and Spectre vulnerabilities. Though the vulnerabilities were discovered mid- last year, the processor weakness that affects …

24
Oct

Botnets and IoT Devices: Your Business Is at Risk

Last year there was an attack on Dyn, an internet infrastructure company, that caused widespread blackouts in company websites and internet access. The botnet found responsible is an open code malware named Mirai that had approximately 100,000 devices flood Dyn’s servers. The DDos attack was the largest to date in internet history. While Dyn neutralized …

17
Oct

Cybersecurity: Is Hacking Back Good for Business?

Cybersecurity is one of the largest concerns for any IT department. Most businesses maintain mass amounts of data on their clients and employees, and breaches can be costly and devastating. Breaches to companies such as Equifax and Yahoo, as well as government entities, have highlighted the need in new light. So much so government is …